by Zasio | Sep 29, 2017 | Blog, By Jared Walker
When paper or electronic records have reached the end of their retention period, how do you appropriately destroy them? Below is a summary of common records destruction methods. Paper Records Confidential Information Shredding: Paper is cut into thin vertical strips...
by Zasio | Sep 25, 2017 | Blog
Simply removing direct and indirect personal identifiers isn’t enough to achieve de-identification of a dataset. Data controllers must also analyze the context in which the data is presented, as well as the risk of re-identification. Not only that, but technical...
by Zasio | Sep 21, 2017 | Blog
The Office of Inspector General (OIG) has broad authority to exclude a healthcare organization from participating in federal healthcare programs (e.g. Medicare, Medicaid). Although exclusions commonly arise from violations of the False Claims Act and Anti-Kickback...
by Zasio | Sep 12, 2017 | Blog
Individuals value their privacy. In contrast, businesses value the ability to leverage personal information to deliver quality products and services to meet the needs of their clients. The legal standards that regulate the protection of personal information help...
by Zasio | Aug 31, 2017 | Events
This year, we’re celebrating our 30th year in business at the ARMA International Conference in Orlando, Florida on Oct 15-16. Celebrate with us, enrich your skills, and expand your network! We know all about the evolving landscape of information governance (IG). In...